Linux-audit Archive on lore.kernel.org
 help / color / mirror / Atom feed
* audit 1.2.2 released
@ 2006-05-12 21:26 Steve Grubb
  2006-05-15 19:57 ` Michael C Thompson
                   ` (2 more replies)
  0 siblings, 3 replies; 43+ messages in thread
From: Steve Grubb @ 2006-05-12 21:26 UTC (permalink / raw)
  To: Linux Audit

Hi,

I've just released a new version of the audit daemon. It can be downloaded 
from http://people.redhat.com/sgrubb/audit  It will also be in rawhide  
tomorrow. The Changelog is:

- Updates for new glibc-kernheaders
- Change auditctl to collect list of rules then delete them on -D
- Update capp.rules and lspp.rules to comment out rules for the possible list
- Add new message types
- Support sigusr1 sender identity of newer kernels
- Add support for ppid in auditctl and ausearch
- fix auditctl to trim the '/' from watches
- Move audit daemon config files to /etc/audit for better SE Linux protection

Beware !  This release has 2 changes to notice. It requires newer 
glibc-kernheaders and it moves the audit configuration files to 
the /etc/audit directory. The specfile should handle the transition 
gracefully.

This release also supports new options in our current development kernels. It 
adds support for filtering by ppid and searching for ppid in the logs. It 
supports getting the signal info for senders of sigusr1. And completes the 
fix for listing or deleting large amounts of syscall rules. Watches that have 
a trailing '/' will now have it trimmed to make the kernel happier.

2 new message types were added AUDIT_DEV_ALLOC and AUDIT_DEV_DEALLOC for LSPP 
work. The capp & lspp rules were updated to not have "possible" as the list 
action.

Please let me know if there are any problems with this release.

-Steve

^ permalink raw reply	[flat|nested] 43+ messages in thread
* RE: audit 1.2.2 released
@ 2006-05-25 15:50 Chad Hanson
  2006-05-26 16:05 ` Darrel Goeddel
  0 siblings, 1 reply; 43+ messages in thread
From: Chad Hanson @ 2006-05-25 15:50 UTC (permalink / raw)
  To: Michael C Thompson, Linda Knippers; +Cc: linux-audit


Comments below...

> 
> I've been running mostly on an i686 (Intel) with the .27 kernel and 
> 1.2.2 tools with the MLS policy. I've tested this on an x86_64 (AMD 
> opteron) and see this problem too. However, this problem does 
> NOT exist 
> when using targeted policy, so it is most likely an MLS SELinux issue.
> My MLS policy is 2.2.42
> 
> > Can you describe more about your configuration and provide exact steps
> > to reproduce the problem?
> 
> 1) Reboot your system (so you've a clean slate)
> 2) Login (tty or pty, doesn't matter, I've done both)
> 3) auditctl -l
> Error sending rule list request (Operation not permitted)
> 4) auditctl -l
> No rules (or whatever you expect to see)

Are you running enforcing or permissive?

I only see this behavior on the LSPP kernels (including 28) after
transitioning to permissive mode, but not on the FC5 2.6.15 2054 kernel
running MLS with the same procedures.

Also, I don't see this behavior the same way. I can reboot, login, newrole
to auditadm_r and run auditctl -l correctly everytime.

The problem behavior I see is as follows below 

1) newrole to secadm_r
2) auditctl -l -- denied as expected. 
3) setenforce 0
4) auditctl -l -- denied (WRONG)
5) auditctl -l -- works correctly (can repeat as many times as desired)
6) setenforce 1 -- everything is back to normal

repeat from #3 to see problems again

-Chad

^ permalink raw reply	[flat|nested] 43+ messages in thread

end of thread, other threads:[~2006-05-26 16:06 UTC | newest]

Thread overview: 43+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2006-05-12 21:26 audit 1.2.2 released Steve Grubb
2006-05-15 19:57 ` Michael C Thompson
2006-05-15 20:04   ` Steve Grubb
2006-05-15 20:14     ` Michael C Thompson
2006-05-16 14:53       ` Michael C Thompson
2006-05-16 15:23         ` Steve Grubb
2006-05-16 16:08           ` Michael C Thompson
2006-05-16 16:28             ` Steve Grubb
2006-05-16 15:34         ` Steve Grubb
2006-05-16 15:53           ` Linda Knippers
2006-05-16 17:23             ` Steve Grubb
2006-05-16 20:38               ` Michael C Thompson
2006-05-16 21:49                 ` Steve Grubb
2006-05-16 22:31                   ` Valdis.Kletnieks
2006-05-17 10:25                     ` Steve Grubb
2006-05-22 17:31               ` Steve Grubb
2006-05-22 19:15                 ` Xin Zhao
2006-05-22 19:24                   ` Steve Grubb
2006-05-22 19:37                     ` Xin Zhao
2006-05-22 19:47                       ` Steve Grubb
2006-05-22 20:15                         ` Xin Zhao
2006-05-23  6:56                       ` Amy Griffis
2006-05-23  3:43                         ` Xin Zhao
2006-05-23 15:11                           ` Steve Grubb
2006-05-23 16:24                 ` Michael C Thompson
2006-05-23 22:20                   ` Michael C Thompson
2006-05-23 23:05                     ` Linda Knippers
2006-05-24 19:44                       ` Michael C Thompson
2006-05-24 20:58                         ` James Antill
2006-05-25 13:48                           ` Michael C Thompson
2006-05-25 15:16                             ` James Antill
2006-05-25 15:22                               ` Michael C Thompson
2006-05-25 15:40                                 ` James Antill
2006-05-24 13:04                     ` Steve Grubb
2006-05-24 20:30                       ` Michael C Thompson
2006-05-17 15:32 ` Michael C Thompson
2006-05-17 15:45   ` Michael C Thompson
2006-05-17 21:12 ` Michael C Thompson
2006-05-17 21:23   ` Steve Grubb
2006-05-17 21:43     ` Michael C Thompson
2006-05-17 21:55       ` Steve Grubb
  -- strict thread matches above, loose matches on Subject: below --
2006-05-25 15:50 Chad Hanson
2006-05-26 16:05 ` Darrel Goeddel

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox